Professional Documents
Culture Documents
2015
Research Paper
ABSTRACT: Security is required to transmit confidential information over the network. Security is also
demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data
security against malicious attacks. RSA algorithm is extensively used in the popular implementations of Public
Key Infrastructures. In asymmetric key cryptography, also called Public Key cryptography, two different keys
(which form a key pair) are used. One key is used for encryption and only the other corresponding key must be
used for decryption. No other key can decrypt the message not even the original (i.e. the first) key used for
encryption. In this paper, we have proposed an improved approach of RSA algorithm using two public key pairs
and using some mathematical logic rather than sending one public key d irectly.Because if an attacker has an
opportunity of getting the public key componet they can find private key value by brute force search.
General Terms: Cryptography, network security
KEYWORDS: IRSA, RSA, security, cryptography
I.
INTRODUCTION
Number theory may be one of the purest branches of mathematics, but it has turned out to be one of
the most useful when it comes to computer security. Sensitive data exchanged between a user and a Web site
needs to be encrypted to prevent it from being disclosed to or modified by unauthorized parties. The encryption
must be done in such a way that decryption is only possible with knowledge of a secret decryption key. The
decryption key should only be known by authorized parties.
In traditional cryptography, such as was available prior to the 1970s, the encryption and decryption
operations are performed with the same key. This means that the party encrypting the data and the party
decrypting it need to share the same decryption key. Establishing a shared key between the parties is an
interesting challenge. If two parties already share a secret key, they could easily distribute new keys to each
other by encrypting them with prior keys. But if they dont already share a secret key, how do they establish the
first one? This challenge is relevant to the protection of sensitive data on the Web and many other applications
like it. This line of thinking in pre-Web terminology prompted two Stanford University researchers,
Whitfield Diffie and Martin Hellman, to write a landmark paper, New Directions in Cryptography in 1976 [6].
The paper suggested that perhaps encryption and decryption could be done with a pair of different keys rather
than with the same key. The decryption key would still have to be kept secret, but the encryption key could be
made public without compromising the security of the decryption key. This concept was called public-key
cryptography because of the fact that the encryption key could be made known to anyone.
The full public-key method would come a year later as an application of another famous problem,
integer factorization[11].
II.
RSA CRYPTOSYSTEM
The Rivest-Shamir-Adleman (RSA) cryptosystem is one of the best known public key cryptosystems
for key exchange or digital signatures or encryption of blocks of data. RSA uses a variable size encryption block
and a variable size key. The key-pair is derived from a very large number, n, that is the product of two prime
numbers chosen according to special rules; these primes may be 100 or more digits in length each, yielding an n
www.ajer.org
Page 143
2015
III.
NUMBER THEORY BEHIND RSA:
III.1 Prime Generation and Integer Factorization
Two basic facts and one conjecture in number theory prepare the way for todays RSA public-key cryptosystem.
FACT 1. Prime generation is easy: Its easy to find a random prime number of a given size.
This is a result of two other points: Prime numbers of any size are very common, and its easy to test whether a
number is a prime even a large prime.
According to the Prime Number Theorem, the expected number of candidates to test will be on the order of ln x
(the natural logarithm of x) where x is a typical number of the intended size.
Large in the cryptographic context typically means 512 bits (155 decimal digits) or more.
FACT 2. Multiplication is easy: Given p and q, its easy to find their product, n = pq.
There are many efficient ways to multiply two large numbers.
CONJECTURE 3. Factoring is hard: Given such an n, it appears to be quite hard to recover the prime factors p
and q.
Despite hundreds of years of study of the problem, finding the factors of a large number still takes a long time in
general. The fastest current methods are much faster than the simple approach of trying all possible factors one
at a time. (Such a method would take on the order of n steps.) However, they are still expensive. For instance, it
has been estimated recently that recovering the prime factors of a 1024-bit number would take a year on a
machine costing US $10 million. A 2048-bit number would require several billion times more work. [11]
III.2 Modular Exponentiation and Roots
Given this background, n will hereafter denote the product of two large, randomly generated primes.
Let m and c be integers between 0 and n-1, and let e be an odd integer between 3 and n-1 that is relatively prime
www.ajer.org
Page 144
2015
IV.
PROPOSED IRSA(IMPROVED RSA)ALGORITHM
RSA is a block cipher in which the plaintext and cipher text are integers between 0 and n- 1 for some n.
Encryption and decryption are of the following form, for some plaintext block M and cipher text block C:
C = My/xmod n
M = Cdmod n = (My/x)dmod n.
Both sender and receiver must know the values of n, y and x only the receiver knows the value of d.
IV.1 Process of Encryption and Decryption:
This is a public key encryption algorithm with a public key of KU = {y,n},{x} and a private key of KR = {d,n}.
For this algorithm to be satisfactory for public-key encryption, the following requirements must be met:
1. It is possible to find values of y, x, d, n such that (My/x) d= M mod n for all M<n.
2. It is relatively easy to calculate My/x and Cd for all values of M <n.
3. y is a multiple of x and e (which the public key in the normal RSA algorithm )
www.ajer.org
Page 145
2015
V.
EXPERIMENTAL RESULTS
In order to justify the performance we used different modulus length(256 bits, 512 bits,1024 bits)
and the block sizes (128 bits,256 bits,512 bits,1024 bits). The two following table shows the experimental
results of RSA and IRSA respectively.
bitlength(n)
256
512
1024
Total time
t=x+y+z
MS
469
1172
3433
blocksize in
bits
key generation(x)
MS
256
512
1024
128
256
512
63
187
612
Encryption
time(y)
MS
67
97
133
Decryption
time(z)
MS
368
918
2728
Total time
t=x+y+z
MS
498
1202
3473
www.ajer.org
Page 146
2015
www.ajer.org
Page 147
2015
The total time comparison(including key generation,encryption and decryption)of RSA and IRSA is below:
Less secure
More secure
VI.
CONCLUSION
This research is a study of number theory and pulic key cryptosystems and based on this improving the
RSA cryptosystem that is more reliable to brute force attack.RSA cryptosystem produces one public key to
encrypt the message. Though it is hard to find out the factors of n and get p and q, two large prime numbers,
therefore brute force attack is more difficult in our proposed algorithm as the encryption keys are sent separtely,
not at once. The proposed RSA is used for system that needs high security but with less speed.
www.ajer.org
Page 148
2015
REFERENCES
[1] Shilpa M Pund, Chitra G Desai. Implemantation of RSA using Mersenne Prime. International Journal of Networking & Parallel
Computing. Volume 1, Issue 3, Dec 2012-Jan 2013.
[2] S. Sharma, J.S. Yadav, P. Sharma. Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm.
International Journal of Advanced Research in Computer Science and Software Engineering, volume 2, Issue 8, August 2012
[3] P.Saveetha,S. Arumugam, Study on improvement in RSA algorithm and its implementation.Volume 3, Issue 6,7,8 ,2012.
[4] P.S.Yadav, P. Sharma, Dr. K. P. Yadav, Implementation of RSA algorithm using Elliptic Curve algorithm for security and
performance enhancement, International Journal of Scientific & Technology Research, Volume 1, Issue 4, May 2012.
[5] D. Pugila, H. Chitrala, S. Lunawat, P.M. Durai Raj Vincent, An Efficient Encryption Algorithm Based On Public Key
Cryptography. International Journal of Engineering and Technology, Volume 5 No 3,Jun-2013.
[6] Burt Kaliski, The Mathematics of the RSA Public-key Cryptosystem RSA Laboratory.
[7] Fatema Chowdhury, Munibur Rahman Chowdhury, Essentials of Number Theory,Pi Publications,Dhaka Bangladesh.2005
[8] B.A. Forouzan, Cryptography & Network Security, Tata Mcgraw Hill publishing company limited, 2010.
[9] T.H. Cormen, C.E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithm, 2nd edition, MIT press,2002.
[10] A.S. Tanenbaum, Computer Networks, 4th edition, Prentice Hall of India, 2007-2008.
[11]
B.R. Ambedkar, S.S. Bedi, A New Factorization Method to Factorize RSA Public Key Encryption, International Journal of
Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011.
www.ajer.org
Page 149